I read a tweet about two days ago and today, MITRE CALDERA 2.0 is out already! If you remember, I wrote briefly about this automated adversary emulation system in my post titled - List of Adversary Emulation Tools. This is a major update and the current version supports Windows, Linux, Mac OSX & Raspberry Pi platforms! A couple of new features include BYOR (Bring Your Own Read more about UPDATE: MITRE CALDERA 2.0

If you liked my older post titled "List of Adversary Emulation Tools", I am sure you must want to know what is the difference or comparison between the different tools. This post is an attempt to do just that -to list down the comparison of open source adversary emulation tools. I have compared their capabilities against the 11 tactics mentioned in the MITRE ATT&CK Read more about Comparison of Open Source Adversary Emulation Tools

Posted: 1 year ago by @pentestit26079 viewsUpdated: May 17, 2019 at 10:43 pm

Every once in a while, the security industry brings forth a new buzz word and introduces terminologies that sound über cool and generate lot's of interest. One such word going around now-a-days is automated "adversary emulation". Let's first understand what this really means. Adversary emulation/simulation offers a method to test a network’s resilience against an advanced Read more about List of Adversary Emulation Tools

Featured Post

Three days ago, an updated version – Sysdig Falco v0.15.0 – was released. It has been some time since I last blogged about this open source behavorial activity monitor which has container support. This release incorporates a lot of rule updates that are now also tagged the for MITRE ATT&CK Framework and patches CVE-2019-8339, a medium severity vulnerability.Read more about UPDATE: Sysdig Falco v0.15.0